Question

Assume that 4 bits have been borrowed. Identify the subnetwork addresses: (choose 3) a. 192.168.14.8 b....

Assume that 4 bits have been borrowed. Identify the subnetwork addresses: (choose 3) a. 192.168.14.8 b. 192.168.14.16 c. 192.168.14.24 d. 192.168.14.32 e. 192.168.14.148 f. 192.168.14.208

Homework Answers

Answer #1

We know this is a Class C address, so we've got eight host bits to begin with: 00000000

The question says four bits have been borrowed for subnetting, so we'll put the subnet bits in bold : 00000000

With all subnet bits set to zero, we get this: 192.168.14.0. That's the first network number, but it's not in the list.

Now set the smallest subnet bit to one - 00010000 - we get 192.168.14.16. That's one on the list.

The next smallest subnet bit combination is 00100000 - we get 192.168.14.32. That's two on the list.

The next smallest subnet bit combination is 00110000 - we get 192.168.14.48. You probably notice a pattern here. :) Each subsequent network number is going up by 16 in that last octet. Going up by 16 from here, we get... 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208 --- 208 is the final choice from that list.

Therefore the answers are:

b)192.168.14.16

d)192.168.14.32

f) 192.168.14.208

Note: Plzzz don' t give dislike.....Plzzz comment if u have any problem i will try to resolve it.......

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Given a Class B network and a number of subnets required, complete the table to identify...
Given a Class B network and a number of subnets required, complete the table to identify the number of bits to borrow from the host field for the subnet field and the maximum number of host addresses available per subnet. Number of Subnets Required Number of Bits to Borrow for the Subnet Field Maximum Number of Hosts per Subnet Subnet Mask in Binary and Decimal Representations 5 3    23 = 8 Class B has 16 host bits by definition. If...
Consider the following symbols and their frequencies: a:1, b:2, c:3, d:4, e:5, f:6 What is the...
Consider the following symbols and their frequencies: a:1, b:2, c:3, d:4, e:5, f:6 What is the amount of bits needed per character for a balanced tree encoding.
Identify all those statements below that are TRUE. Choose one or more. A Patents provide a...
Identify all those statements below that are TRUE. Choose one or more. A Patents provide a more exclusive right than copyrights. B Patents last longer than copyrights. C Trademarks may last indefinitely. D Firms are not legally prevented from discovering and using one another's trade secrets through reverse engineering. Identify all those ways in which either inventions or literary and artistic creativity have been encouraged. Choose one or more. A First mover advantage. B Privately funded research in universities. C...
Identify the proper hormonal release-response from the list below:(Choose the best answer) A. FSH release- stimulates...
Identify the proper hormonal release-response from the list below:(Choose the best answer) A. FSH release- stimulates oogenesis and estrogen release B. Inhibin- directly controls progesterone secretion C. Relaxin- inhibits oxytocin secretion D. FSH- directs formation of corpus luteum E. Progesterone- stimulates ovulation F. Both A and C G.Both D and E 2. All are true of the myometrium:(Choose the best answer) A. It is composed of smooth muscle in three layers B. It is the site of implantation of the...
Let the population have N=7 units, with {(unit,value)} = {(A,-1),(B,+1),(C,-2),(D,+3),(E,-4),(F,+5),(G,-6)}. The design is as follows: first...
Let the population have N=7 units, with {(unit,value)} = {(A,-1),(B,+1),(C,-2),(D,+3),(E,-4),(F,+5),(G,-6)}. The design is as follows: first choose A or B at random; if A then choose from {C,D} at random, if B then choose from {E,F,G} at random. 1) Find the first-order inclusion probabilities (note that the sample size n is fixed at 2). Verify (show numerically for this example) that the Horvitz-Thompson estimator is unbiased for the population total. (Hint: find the probability of each sample and the value...
Identify whether the following are true or false. (a) 5 ∈ {1, 2, {3, 4}, {1},...
Identify whether the following are true or false. (a) 5 ∈ {1, 2, {3, 4}, {1}, {5}} (b) {5} ∈ {1, {2}, {3, 4}, 5, {5}} (c) {5} ⊆ {1, {2}, {3, 4}, 5, {5}} (d) {3, 4} ⊆ {1, 2, {3, 4}, {1}, {5}} (e) {1, 2} ⊆ {1, 2, {3, 4}, {1}, {5}} (f) {5} ∈ P(N) (g) {5} ⊆ P(N) (h) {{5}} ∈ P(N) (i) ∅ ⊆ P(R) (j) ∅ ∈ P(R)
Suppose a company received the IP network: 221.163.175.0/16. You want to set up the company’s network...
Suppose a company received the IP network: 221.163.175.0/16. You want to set up the company’s network to limit the number of hosts on each subnet to approximately 60 a. What class of address is this? b. How many subnets are possible? c. How many bits must be borrowed from the host bits to be used for subnet ID?   d, What is the subnet mask? e. How many possible hosts could be on each subnet, assuming the first and last addresses...
Let A,B ∈ M3(R) with |A| = 4 and |B| = −3. Evaluate (a) |AB|, (b)...
Let A,B ∈ M3(R) with |A| = 4 and |B| = −3. Evaluate (a) |AB|, (b) |5A|, (c) |BT|, (d) |A−1|, (e) |A3|, (f) |ATA|, (g) |B−1AB|.
1) Write the assembly code to implement expression A = B + C * ((D -...
1) Write the assembly code to implement expression A = B + C * ((D - E) * F) on 3-, 2-, 1-, and 0- address machines. Do not rearrange the expression. In accordance with "good programming", computing the expression should not change the values of its operands. Feel free to use a temporary variable, perhaps called T, if you feel you need one. 2) For the four code implementations of (1), compute the total size of the program, assuming:...
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits...
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits are used for host number on the child network (subnet) b. how many usable addresses can exist on this child network (subnet) c. what the first usable address is on this child network (subnet) d. what the last usable address is on this child network (subnet) e. what the child network’s (subnet's) broadcast address is f. what the child network's (subnet's) network number is...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT